MoonJian / Attack_Face_RecognitionLinks
The implementation of AttackAI in Ali Tianchi Security Competition Phase One.
☆30Updated 6 years ago
Alternatives and similar repositories for Attack_Face_Recognition
Users that are interested in Attack_Face_Recognition are comparing it to the libraries listed below
Sorting:
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Updated 6 years ago
- ☆43Updated 4 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Updated 2 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Updated 6 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 7 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Updated last year
- An adversarial robustness evaluation library on face recognition.☆113Updated 2 years ago
- ☆43Updated 5 years ago
- [AAAI 2020] Pytorch codes for Regularized Fine-grained Meta Face Anti-spoofing☆143Updated 3 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆89Updated 6 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Updated 3 years ago
- Pytorch implementation of mainstream face recognition algorithms(ArcFace, CosFace).☆104Updated 5 years ago
- A novel data-free model stealing method based on GAN☆133Updated 3 years ago
- ☆10Updated 2 years ago
- ☆38Updated 5 years ago
- Pytorch implementation of CosFace☆258Updated 5 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆337Updated 4 years ago
- ☆41Updated 3 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆167Updated 6 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 4 years ago
- The code for ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples (CVPR2019)☆115Updated 3 years ago
- Implementation of the paper "Learning Meta Model for Zero- and Few-shot Face Anti-spoofing"☆64Updated 4 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51Updated 7 months ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆142Updated 2 years ago
- The first real-world adversarial attack on MTCNN face detetction system to date☆72Updated 4 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆415Updated 4 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 5 years ago
- Learning Generalized Spoof Cues for FaceAnti-spoofing reimplementation in pytorch☆39Updated last year
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆61Updated 6 years ago
- [CVPR 2019] Pytorch codes for Multi-adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection☆84Updated 5 years ago